1 / 1

Motivation

A Policy Based Infrastructure for Social Data Access with Privacy Guarantees Palanivel Kodeswaran * and Evelyne Viegas † * University of Maryland, Baltimore County † Microsoft Research. Motivation

Download Presentation

Motivation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Policy Based Infrastructure for Social Data Access with Privacy Guarantees Palanivel Kodeswaran* and Evelyne Viegas† *University of Maryland, Baltimore County †Microsoft Research • Motivation • Emergence of social networks of various types where users want to share data yet retain control • Large amounts of user data are held behind the vaults of large corporations due to legal requirements • Researchers need access to these datasets to study user patterns and other trends Complete Access Policy Infrastructure Data Sharing Policy Abstract Access delegation chain Problem Statement Build a data sharing framework for scientific research while guaranteeing and enforcing user privacy preferences • Implementation and Evaluation • Prototype implemented using SecPAL • Create new verbs from purpose and access mode • Emergency + Complete Access => EmergencyCompleteAccess • Modified census dataset from UCI • manually generated ID and salary • Abstract access on age returns age group, viz. 30-40 • Statistical access implemented using differential privacy Statistical Access • Proposed Solution • A policy based infrastructure which • Allows users to specify who can access data and its acceptable use • Introduces additional access modes to control the amount of information that is released by exploiting emerging privacy preserving data analysis techniques IEEE Policy 2010

More Related